لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

2023 أسئلة امتحان 350-701 مجانًا: اختبار تدريبي وإجاباته

Exam NameImplementing and Operating Cisco Security Core Technologies
Exam Number350-701 SCOR
Practice ExamCisco Certified Network Professional Security Practice Test 
Number of questions90-110
Passing Score750-850 / 1000
Exam Price$400 USD
خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What is the result of running the crypto isakmp key ciscXXXXXXXX address 172.16.0.0 command?
A. authenticates the IKEv2 peers in the 172
B. authenticates the IP address of the 172
C. authenticates the IKEv1 peers in the 172
D. secures all the certificates in the IKE exchange by using the key ciscXXXXXXXX
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which command enables 802.1X globally on a Cisco switch?
A. dot1x system-auth-control
B. dot1x pae authenticator
C. authentication port-control auto
D. aaa new-model
عرض الإجابة
اجابة صحيحة: A
السؤال #3
What is a characteristic of Dynamic ARP Inspection?
A. DAI determines the validity of an ARP packet based on valid IP to MAC address bindings from the DHCP snooping binding database
B. In a typical network, make all ports as trusted except for the ports connecting to switches, which are untrusted
C. DAI associates a trust state with each switch
D. DAI intercepts all ARP requests and responses on trusted ports only
عرض الإجابة
اجابة صحيحة: A
السؤال #4
When wired 802.1X authentication is implemented, which two components are required? (Choose two.)
A. authentication server: Cisco Identity Service Engine
B. supplicant: Cisco AnyConnect ISE Posture module
C. authenticator: Cisco Catalyst switch
D. authenticator: Cisco Identity Services Engine
E. authentication server: Cisco Prime Infrastructure
عرض الإجابة
اجابة صحيحة: AC
السؤال #5
What is a difference between an XSS attack and an SQL injection attack?
A. SQL injection is a hacking method used to attack SQL databases, whereas XSS attack can exist in many different types of applications
B. XSS attacks are used to steal information from databases, whereas SQL injection attacks are used to redirect users to websites where attackers can steal data from them
C. XSS is a hacking method used to attack SQL databases, whereas SQL injection attacks can exist in many different types of applications
D. SQL injection attacks are used to steal information from databases, whereas XSS attacks are used to redirect users to websites where attackers can steal data from them
عرض الإجابة
اجابة صحيحة: D
السؤال #6
What is a difference between a DoS attack and DDos attack?
A. A DoS attack is where a computer is used to flood a server with TCP packets, whereas DDoS attack is where a computer is used to flood a server with UDP packets
B. A DoS attack is where a computer is used to flood a server with UDP packets, whereas DDoS attack is where a computer is used to flood a server with TCP packets
C. A DoS attack is where a computer is used to flood a server with TCP and UDP packets, whereas DDoS attack is where a computer is used to flood multiple servers that are distributed over a LAN
D. A DoS attack is where a computer is used to flood a server with TCP and UDP packets, whereas DDoS attack is where multiple systems target a single system with a DoS attack
عرض الإجابة
اجابة صحيحة: D
السؤال #7
What are two advantages of using Cisco AnyConnect over DMVPN? (Choose two.)
A. It provides spoke-to-spoke communications without traversing the hub
B. It enables VPN access for individual users from their machines
C. It allows multiple sites to connect to the data center
D. It allows different routing protocols to work over the tunnel
E. It allows customization of access policies based on user identity
عرض الإجابة
اجابة صحيحة: BE
السؤال #8
What is the difference between a vulnerability and an exploit?
A. A vulnerability is a weakness that can be exploited by an attacker
B. A vulnerability is a hypothetical event for an attacker to exploit
C. An exploit is a hypothetical event that causes a vulnerability in the network
D. An exploit is a weakness that can cause a vulnerability in the network
عرض الإجابة
اجابة صحيحة: A
السؤال #9
What is the term for having information about threats and threat actors that helps mitigate harmful events that would otherwise compromise networks or systems?
A. threat intelligence
B. Indicators of Compromise
C. trusted automated exchange
D. The Exploit Database
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Refer to the exhibit. An engineer is implementing a certificate based VPN. What is the result of the existing configuration?
A. Only an IKEv2 peer that has an OU certificate attribute set to MANGLER establishes an IKEv2 SA successfully
B. The OU of the IKEv2 peer certificate is used as the identity when matching an IKEv2 authorization policy
C. The OU of the IKEv2 peer certificate is set to MANGLER
D. The OU of the IKEv2 peer certificate is encrypted when the OU is set to MANGLER
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which kind of API that is used with Cisco DNA Center provisions SSIDs, QoS policies, and update software versions on switches?
A. event
B. intent
C. integration
D. multivendo
عرض الإجابة
اجابة صحيحة: B
السؤال #12
A network engineer needs to select a VPN type that provides the most stringent security, multiple security associations for the connections, and efficient VPN establishment with the least bandwidth consumption. Why should the engineer select either FlexVPN or DMVPN for this environment?
A. DMVPN because it uses multiple SAs and FlexVPN does not
B. DMVPN because it supports IKEv2 and FlexVPN does not
C. FlexVPN because it supports IKEv2 and DMVPN does not
D. FlexVPN because it uses multiple SAs and DMVPN does not
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Refer to the exhibit. Which command was used to generate this output and to show which ports are authenticating with dot1x or mab?
A. show authentication registrations
B. show authentication method
C. show dot1x all
D. show authentication sessions
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Refer to the exhibit. What does the number 15 represent in this configuration?
A. privilege level for an authorized user to this router
B. access list that identifies the SNMP devices that can access the router
C. interval in seconds between SNMPv3 authentication attempts
D. number of possible failed attempts until the SNMPv3 user is locked out
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: